Editors:
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10175)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): PKC: IACR International Conference on Public-Key Cryptography
Conference proceedings info: PKC 2017.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (18 papers)
-
Front Matter
-
Encryption with Access Control
-
Front Matter
-
-
Fully Homomorphic Encryption
-
Front Matter
-
-
Real-World Schemes
-
Front Matter
-
-
Multiparty Computation
-
Front Matter
-
About this book
The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols, Encryption Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control, Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.
Editors and Affiliations
-
CWI , Amsterdam, The Netherlands
Serge Fehr
Bibliographic Information
Book Title: Public-Key Cryptography – PKC 2017
Book Subtitle: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II
Editors: Serge Fehr
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-662-54388-7
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2017
Softcover ISBN: 978-3-662-54387-0Published: 26 February 2017
eBook ISBN: 978-3-662-54388-7Published: 24 February 2017
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 556
Number of Illustrations: 81 b/w illustrations
Topics: Cryptology, Systems and Data Security, Coding and Information Theory, Computer Communication Networks, Algorithm Analysis and Problem Complexity, Management of Computing and Information Systems